Matryoshka RAT

Description

(ClearSky) The Matryoshka infection framework is built of three parts:

• Dropper o Obfuscating code and signaling to the C2 that the file has been executed o Launching the loader and using it to execute functions. o Comparing anti-analysis logic and reporting it back to C2 • Reflective Loader o Employing anti-debugging and anti-sandboxing techniques o Runtime API Address resolver o Covert DLL injection of the RAT library o Persistence file on disk • RAT component o Configuring the Reflective Loader to survive reboots and process exits o DNS Command and Control communication o Common RAT functionalities

Names

Name
Matryoshka RAT
Matryoshka

Category

Malware

Type

  • Backdoor
  • Dropper
  • Loader
  • Info stealer

Information

Mitre Attack

Malpedia

Alienvault Otx

Other Information

Uuid

dc27057d-c0bb-48f2-a418-4293b46366fc

Last Card Change

2022-12-30